ProxyChains + Tor Backtrack 5 R3 Tutorial

To remain anonymous is one of the important aspect of Information Security, if you want to conduct penetration testing on a remote computer then active connection is required which surely reveal your identity, sometimes you need to hide your identity while doing vulnerability assessment because of your anonymity and security. Proxy Chaning is a concept which is very helpful to hide an identity on the Internet.

What is Proxy Chaining?

Your Computer → Proxy Server → Target Computer

Proxy Concept

The concept mentioned above is the concept of simple proxy, when a user uses one proxy server to hide his/her identity.

Your Computer → Proxy Server 1 +.......+ Proxy Server N → Target Computer

Proxy Chains

Now the usage of multiple proxies at a time is called Proxy Chaining, it is reliable in-terms to hide the identity. In simple words

Proxy Chaning is the process to use multiple proxies in chain.”

What is Proxy Chains?

The basic concept of proxy chaining is discussed now in this section we will discuss the practical aspect of Proxy Chaining, Proxy Chains (ProxyChains) is an open source program which allows you to make TCP and DNS connection by using proxy for example TOR.

TOR is not necessary for proxychains, you may use any SOCKS 4, SOCKS 5 and HTTPS proxy. There are so many advantages of Proxy Chains for example:

    • Hide identity
    • It can bypass Firewall (If you are behind a firewall or local proxy server)
    • And many more

      Proxy Chains Tutorial

      Proxy Chaining can be achieved on Windows OS too but in this section I will discuss Linux Backtrack, you may use any Linux distribution including Ubuntu.

      In Backtrack 5 R3 proxychains is already configured but if you are using any other version of Linux you may download it from official website. Follow the command mentioned below to get proxychains via terminal.

      [email protected]:~# apt-get install proxychains

      Now the second step is to configure proxychains, there are two options that can be used whether use nano to edit config file on terminal and the other option is to use your favorite editor, both commands are mentioned below.

      [email protected]:~# nano /etc/proxychains.conf
      [email protected]:~# sudo gedit /etc/proxychains.conf

      The second option has been used to discuss this tutorial, you may see that there are three options along with there definitions and usage.

      • Dynamic Chain
      • Strict Chain
      • Random Chain
      ProxyChains Configuration

      Delete # from the front of technique that you want to use, its time to get some proxies. Private and highly anonymous proxies work best (if you can afford) otherwise use the publicly available proxies.

      Do not delete the last line, add your proxy list after this line.

      Proxy Chains Configuration

      Dynamic chain is very good if you are using publicly available proxies.

      Proxy Chains usage is very simple (proxychains <prog> [args])
      [email protected]:~# proxychains nmap
      [email protected]:~# proxychains firefox
      [email protected]:~# proxychains msfconsole
      [email protected]:~# proxychains telnet

      Proxy Chaining
       This tutorial completely demonstrate the basic concept and usage of Proxy Chaining and Proxy Chains, if you have any question then feel free to ask on the comment box. 

      Note: If you want to learn more about Linux and Windows based Penetration testing, you might want to subscribe our RSS feed and Email Subscription  or become our Facebook fan! You will get all the latest updates at both the places.
      ProxyChains + Tor Backtrack 5 R3 Tutorial Reviewed by Ethical Hacking on 9:41 PM Rating: 5

      No comments:

      Feel free to ask questions, we love to respond.

      All Rights Reserved by The World of IT & Cyber Security: © 2014 - 2015
      Powered By Blogger, Designed by Sweetheme

      Contact Form


      Email *

      Message *

      Powered by Blogger.